Your company is participating in a Cyber Security Education Program.


This Alert Test Phishing Attack included the following social engineering techniques:


  1. Use of company full name in body of email to associate with your employer.
  2. Email name included your company domain (example: all@yourcompany.com)
  3. From email name includes <fake email> to appear as the "real" email used to distract you; this is associated with #1
  4. Subject to appear critical (example: Alert Notice Test)
  5. Action required (example: Confirm Receipt)
  6. Google Translate was used to generate bi-lingual content to look more official.


How to spot this was a phishing email:



  1. Was this an email you were expecting?
  2. Was this Alert Test System and test communicated to you by management?
  3. From email address ("real" at end; after <fake email>) is some random domain not associated with your company (example: @lang-fr-en.com is not associated with your company)
  4. The link provided references a domain not associated with your company (example: lang-fr-en.com) and is hidden behind text (example: Alert Test Received) requiring you to "hover" or sample the link; this type of email could be associated with this type of email given the bi-lingual content.
  5. This email was/may have been filtered and in your junk mail folder.


“An employee is either an asset to your cyber security or a risk.”